From 8d23a381e608a8f6c78ba62a3fcb4e6ec2be6d85 Mon Sep 17 00:00:00 2001 From: Dan Liew Date: Mon, 19 Oct 2015 18:05:07 +0100 Subject: Undo 32-bit malloc() hack in preparation for building a 32-bit docker image. --- lib/Core/MemoryManager.cpp | 12 ------------ 1 file changed, 12 deletions(-) diff --git a/lib/Core/MemoryManager.cpp b/lib/Core/MemoryManager.cpp index 0caa504d..0986c122 100644 --- a/lib/Core/MemoryManager.cpp +++ b/lib/Core/MemoryManager.cpp @@ -26,18 +26,6 @@ using namespace klee; /***/ MemoryManager::MemoryManager(size_t pointerBitWidth) : pointerBitWidth(pointerBitWidth) { - if (pointerBitWidth < 64) { - // FIXME: KLEE should implement it's own memory manager for - // the program we are executing and not invoke malloc so - // we have finer control over the addresses we use. - // HACK: - // Try make sure malloc() gives us back - // addresses that fit in a 32-bit integer when running - // 32-bit code. - // This works by preventing malloc() from using mmap() - // so it uses sbrk() instead... gross - mallopt(M_MMAP_MAX, 0); - } } MemoryManager::~MemoryManager() { -- cgit 1.4.1